156,306 Hits in 4.1 sec

Access Policy Consolidation for Event Processing Systems

B. Schilling, B. Koldehofe, K. Rotherme, U. Ramachandran
2013 2013 Conference on Networked Systems  
Each incoming event stream can be protected by the specification of an access policy and is enforced by algorithms for access consolidation.  ...  This paper presents a finegrained access management for complex event processing.  ...  Grau, and the reviewers for their helpful comments.  ... 
doi:10.1109/netsys.2013.18 dblp:conf/kivs/SchillingKRR13 fatcat:mgnryprd45dwlnxgtohffxm7mu

Access Policy Consolidation for Event Processing Systems

K Sainath, M Sudent, R Anitha, Jagadeeswara Rao, Annam
2014 unpublished
Using the access-policy every incoming event can be secured. We can increase the processing of events by calculating the measure of obfuscation values for events.  ...  Calculate the threshold for obfuscation as one of the part of access-policy and avoid the accessrequirements and events will be delivered more reliable.  ...  We measure the threshold for obfuscation for attributes of events in every Correlation process obfuscation of attributes of events are produced is determined by proposed of access-policy consolidation  ... 


Raminaidu Allu, K Koteswararaoass
2016 unpublished
Using the access-policy every incoming event can be secured. We can increase the processing of events by calculating the measure of obfuscation values for events.  ...  Calculate the threshold for obfuscation as one of the part of access-policy and avoid the access requirements and events will be delivered more reliable. In this way we can deliver the more events.  ...  We measure the threshold for obfuscation for attri-butes of events in every Correlation process obfusca-tion of attributes of events are produced is determined by proposed of access-policy consolidation  ... 

Reinforcement of Event Streams by Obfuscation over Multitudinous Correlations

N. Pavani
2016 International Journal Of Engineering And Computer Science  
The data may come from multiple origins in complex event processing systems and transmitted through multiple security authorities.  ...  Present event processing systems are failing in conserving the privacy constraints of incoming event streams in a sequence of eventually applied stream operations.  ...  For every correlation pace the obfuscation of event attributes in created event preservatives by the planned access policy consolidation protocol.  ... 
doi:10.18535/ijecs/v5i10.10 fatcat:nisrb3irlnahlbk3ktqsigh4pe

Reducing the energy cost of computing through efficient co-scheduling of parallel workloads

C. Hankendi, A. K. Coskun
2012 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE)  
Efficient consolidation for parallel workloads is a challenging task as a number of factors, such as scalability, interthread communication patterns, or memory access frequency of the applications affect  ...  One promising method for improving energy efficiency is co-scheduling applications on compute nodes.  ...  Bus access based policy performs worst among all policies, since bus accesses per µOP does not necessarily capture the frequency of the bus accesses.  ... 
doi:10.1109/date.2012.6176641 dblp:conf/date/HankendiC12 fatcat:ylcdmoh6qjbexdoexd3y723rpu

Towards Virtualization Concepts for Novel Automotive HMI Systems [chapter]

Simon Gansel, Stephan Schnitzer, Frank Dürr, Kurt Rothermel, Christian Maihöfer
2013 IFIP Advances in Information and Communication Technology  
Based on these requirements, we present the concept for a Virtualized Automotive Graphics System (VAGS ) that allows for the consolidation of mixed-criticality graphics ECUs.  ...  First, we investigate relevant ISO standards and legal requirements and derive seven technical requirements for a virtualized automotive HMI system.  ...  Acknowledgement This paper has been supported in part by the ARAMiS (Automotive, Railway and Avionics Multicore Systems) project of the German Federal Ministry for Education and Research (BMBF) with funding  ... 
doi:10.1007/978-3-642-38853-8_18 fatcat:eidt7zfoync5ncj7ivbycms4g4

A $(\rm UCON_{ABC})$ Resilient Authorization Evaluation for Cloud Computing

Arlindo Luis Marcon, Altair Olivo Santin, Maicon Stihler, Juliana Bachtold
2014 IEEE Transactions on Parallel and Distributed Systems  
The business-driven access control used in cloud computing is not well suited for tracking fine-grained user service consumption.  ...  UCON ABC applies continuous authorization reevaluation, which requires usage accounting that enables fine-grained access control for cloud computing.  ...  Usage Control and Policies Management The CPAP and SMCD (Fig. 7) convert SLA into rules for defining policies and access credentials (event RE) for users on the CD (event AU).  ... 
doi:10.1109/tpds.2013.113 fatcat:dkyogyvyz5fo7nwuhgyh4qowc4

Sustainable Implementation of Access Control

Mihaela Muntean, Laurenţiu Dijmărescu
2018 Sustainability  
The organization's policies and procedures are taken into consideration.  ...  Sustainable implementation of access control implies approaches at different levels.  ...  Any additional approach in consolidating a sustainable access control increases the robustness of the system. Thereby, the proposed demarche increases the capabilities of the overall security system.  ... 
doi:10.3390/su10061808 fatcat:j3lgm4xztvathgoewjoitzghqi

Towards Consolidated Presence

Manfred Hauswirth, Jérôme Euzenat, Owen Friel, Keith Griffin, Pat Hession, Brendan Jennings, Tudor Groza, Siegfried Handschuh, Ivana Podnar Zarko, Axel Polleres, Antoine Zimmermann
2010 Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing  
., the ability to automatically identify the status and availability of communication partners, is becoming an invaluable tool for collaboration in enterprise contexts.  ...  In this paper, we argue for efficient presence management by means of a holistic view of both physical context and virtual presence in online communication channels.  ...  Policies are typically formulated as event-condition-actions rules.  ... 
doi:10.4108/icst.collaboratecom.2010.48 dblp:conf/colcom/HauswirthEFGHJGHZPZ10 fatcat:4dcmxwwhfvfbfnhn7y2nze5nsq

Security Requirements in Healthcare

Konstantin Beznosov
2005 Zenodo  
Outline: • Risks • Requirements – Security requirements to the healthcare organizations – functional and non-functional requirements for security architectures • BHSSF example to illustrate  ...  • Clinical systems are from all major vendors • Separate user name and password for each system •  ...  Processing Records Information Access Control Internal Audit Personnel Security Security Configuration Management Security Incident Procedures Security Management Process Termination  ... 
doi:10.5281/zenodo.3264199 fatcat:qzjkgghjp5gm3b7bxx7663rs4u

Archiving and Managing Remote Sensing Data using State of the Art Storage Technologies

B. Lakshmi, C. Chandrasekhara Reddy, S. V. S. R. K. Kishore
2014 The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences  
Concurrent access by multiple systems is ensured for processing and generation of data products.  ...  For this reason, it is useful to employ a shared file system which allows every processing system to directly access the same pool where raw images were stored.  ...  Concurrent access by multiple systems is ensured for processing and generation of data products. Disk based systems provide high performance front-end for an archive.  ... 
doi:10.5194/isprsarchives-xl-8-1153-2014 fatcat:6xdt3wxxhretxaailn2lo3zxne

Architecture and prototype of a WLCG data lake for HL-LHC

Ian Bird, Simone Campana, Maria Girone, Xavier Espinal, Gavin McCance, Jaroslava Schovancová, A. Forti, L. Betev, M. Litmaath, O. Smirnova, P. Hristov
2019 EPJ Web of Conferences  
We will highlight how the system leverages its distributed nature, the economy of scale and different classes of storage to optimise the hardware and operational cost, through a set of policy driven decisions  ...  The computing strategy document for HL-LHC identifies storage as one of the main WLCG challenges in one decade from now.  ...  The test scenarios were run for two different workflows. The first workflow is CPU bound: downloads 40 MB of input and processes two events in approximately 5 minutes per event.  ... 
doi:10.1051/epjconf/201921404024 fatcat:hsh7eur4pzbyvlrjue7eqeh6vy

Disambiguation Solution for Persons' Accounts in Research Information Management Systems

Maxim S. Sedelnikov, Roman N. Gordeev, Anastasia V. Kuzmicheva, Artem G. Odulov
2016 Indian Journal of Science and Technology  
Novelty of the Study: The approach is suitable for systems with shared emails or user accounts.  ...  In addition, they have calculated sensitivity for the process of person identification to the estimated amount of manual work on disambiguation.  ...  If a corporate policy requires a deprecated person to be kept after consolidation, a person's log should contain an event about a consolidation saying that the person is a deprecated person (ID of the  ... 
doi:10.17485/ijst/2016/v9i43/101683 fatcat:47vr4umjqje53mo3coxexaxu5e

Stalled European Integration, the Primordialization of Nationalism, and Autocratization in Macedonia between 2008 and 2015

Ognen Vangelov
2017 Intersections  
This paper examines the process of autocratization in Macedonia through an analysis of how an exogenous shock enabled internal formative events in that the ruling regime headed by Prime Minister Nikola  ...  Gruevski commenced a process of primordialization of nationalism.  ...  Slovenia) 4 to sign the Association and Stabilization Agreement with the European Union as a first step to accession. 5 This event was expected to pave Macedonia's way to full democratic consolidation  ... 
doi:10.17356/ieejsp.v3i4.342 fatcat:vpsfbdmaovbrtidpyeuag52zle

Using Registries to Identify Adverse Events in Rheumatic Diseases

G. Lionetti, Y. Kimura, L. E. Schanberg, T. Beukelman, C. A. Wallace, N. T. Ilowite, J. Winsor, K. Fox, M. Natter, J. S. Sundy, E. Brodsky, J. R. Curtis (+17 others)
2013 Pediatrics  
Data access will be governed by the rigorous CARRA Data and Sample Sharing policies and overseen by the SOC.  ...  and reporting Ensuring a reliable process for efficient detection and management of adverse events The SOC is responsible for the evaluation, adjudication, and appropriate notification and reporting of  ... 
doi:10.1542/peds.2013-0755 pmid:24144710 pmcid:PMC3813393 fatcat:hjbvnwtbtjav5jc3cj6qngbnd4
« Previous Showing results 1 — 15 out of 156,306 results